Answer
client computer internal corporate back-end system corporate servers communications lines
1 points
Question 2
Answer
war driving sniffing spoofing snooping
1 points
Question 3
Answer
uses tokens to validate a user’s identity uses third-party CAs to validate a user’s identity uses digital signatures to validate a user’s identity is used primarily by individuals for personal correspondence
1 points
Question 4
Answer
infecting web search bots with malware infecting corporate servers with “zombie” Trojan horses that allow undetected access through a back door using web search bots to infect other computers causing other people’s computers to become “zombie” PCs following a master computer
1 points
Question 5
Answer
imposes responsibility on companies and management to safeguard the accuracy of financial information specifies best practices in information systems security and control outlines medical security and privacy rules requires financial institutions to ensure the security of customer data
1 points
Question 6
Answer
Trojan horse spyware virus worm
1 points
Question 7
Answer
email voice-mail spreadsheets instant messages
1 points
Question 8
Answer
recovery-oriented computing fault tolerant computing high availability computing disaster recovery planning
1 points
Question 9
Answer
“Controls” “Benchmarking” “Security” “Algorithms”
1 points
Question 10
Answer
application proxy filtering intrusion detection system stateful inspection packet filtering
1 points
Question 11
Answer
customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction Websites must disclose their information practices before collecting data data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use there is a mechanism in place to enforce FIP principles
1 points
Question 12
Answer
wrong, because if everyone were to do this, the concept of personal property is defeated. acceptable, because the higher value is the survival of the family wrong, because the man would not want the grocer to steal from him acceptable, because the grocer suffers the least harm
1 points
Question 13
Answer
allows protection from internet theft of ideas put forth publicly puts the strength of law behind copyright is easy to define grants a monopoly on underlying concepts and ideas
1 points
Question 14
Answer
PGP COPPA P3P safe-harbor
1 points
Question 15
Answer
Freedom of Information Act Gramm-Leach-Bliley Act Privacy Protection Act HIPAA
1 points
Question 16
Answer
categorical imperative utilitarian principle risk aversion principle golden rule
1 points
Question 17
Answer
information rights and obligations system quality property rights and obligations accountability and control
1 points
Question 18
Answer
in a web directory on the website computer on the visitor’s computer on the ISP’s computer
1 points
Question 19
Answer
make work environments much more pleasant blur the traditional boundaries between work and family time create economies of efficiency centralize power at corporate headquarters
1 points
Question 20
Answer
the years of waiting to receive it that only the underlying ideas are protected preventing the ideas from falling into public domain digital media cannot be patented
1 points
Save